We propose enhancing a reconfigurable and extensible embedded RISC processor core with a protected zone for isolated execution of cryptographic algorithms. The protected zone is a collection of processor subsystems such as functional units optimized for high-speed execution of integer operations, a small amount of local memory for storing sensitive data during cryptographic computations, and special-purpose and cryptographic registers to execute instructions securely. We outline the principles for secure software implementations of cryptographic algorithms in a processor equipped with the proposed protected zone. We demonstrate the efficiency and effectiveness of our proposed zone by implementing the most-commonly used cryptographic algorit...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
International audienceGeneral-purpose processors are not suitable for secure cryptographic key manag...
Les attaques par canaux auxiliaires telles que l'analyse différentielle de la consommation de couran...
We design and realize a protected zone inside a reconfigurable and extensible embedded RISC processo...
Abstract—We design and realize a protected zone inside a reconfigurable and extensible embedded RISC...
Cryptographic algorithms, although being secure in theoretical construction, have many practical imp...
Cryptarchi 2010Hardware cryptographic systems must fulfill contradictory requirements: fast parallel...
The growing problem of breaches in information security in recent years has created a demand for ear...
Practical implementations of cryptographic algorithms are vulnerable to side-channel analysis and fa...
The growing problem of breaches in information security in recent years has created a demand for ear...
The current hot topic in cyber-security is not constrained to software layers. As attacks on electro...
It is clear that Cryptography is computationally intensive. It is also known that embedded systems h...
When used in cryptographic applications, generalpurpose processors are often completed by a cryptogr...
This thesis presents work on the efficiency and security of cryptographic software. First it describ...
Nowadays, we use embedded electronic devices in almost every aspect of our daily lives. They represe...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
International audienceGeneral-purpose processors are not suitable for secure cryptographic key manag...
Les attaques par canaux auxiliaires telles que l'analyse différentielle de la consommation de couran...
We design and realize a protected zone inside a reconfigurable and extensible embedded RISC processo...
Abstract—We design and realize a protected zone inside a reconfigurable and extensible embedded RISC...
Cryptographic algorithms, although being secure in theoretical construction, have many practical imp...
Cryptarchi 2010Hardware cryptographic systems must fulfill contradictory requirements: fast parallel...
The growing problem of breaches in information security in recent years has created a demand for ear...
Practical implementations of cryptographic algorithms are vulnerable to side-channel analysis and fa...
The growing problem of breaches in information security in recent years has created a demand for ear...
The current hot topic in cyber-security is not constrained to software layers. As attacks on electro...
It is clear that Cryptography is computationally intensive. It is also known that embedded systems h...
When used in cryptographic applications, generalpurpose processors are often completed by a cryptogr...
This thesis presents work on the efficiency and security of cryptographic software. First it describ...
Nowadays, we use embedded electronic devices in almost every aspect of our daily lives. They represe...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
International audienceGeneral-purpose processors are not suitable for secure cryptographic key manag...
Les attaques par canaux auxiliaires telles que l'analyse différentielle de la consommation de couran...